Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

What is an Attack Vector?

Attack vectors are the techniques attackers deploy to infiltrate or breach your network. Certain attack vectors take aim at humans that have network access, while other attack vectors target weaknesses in overall infrastructure and security. If this video doesn't cover everything you need to know, you can learn more about attack vectors at our Noname Academy: nonamesecurity.com/learn/what-is-an-attack-vector/

What is API Management?

API management is not a single workload. Rather, it is an area of practice within IT that incorporates many different tasks and processes. It spans API creation and API publishing—and continues through the full API lifecycle through retirement. API management also involves monitoring APIs for performance and adherence to service level agreements (SLAs).

What is Software Composition Analysis (SCA)?

A subset of application security testing, software composition analysis (SCA) refers to an automated process which scans open source software, allowing security analysts to identify precisely which libraries and components have been used in a piece of software. Code is parsed automatically and scanned against a known list of open source vulnerabilities.